File name:

LARKSHARPSPOOFER.zip

Full analysis: https://app.any.run/tasks/bff72926-9841-43b3-b63e-bfcaaf7e90c1
Verdict: Malicious activity
Analysis date: January 02, 2025, 15:25:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
python
pyinstaller
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

5E5A8A54FC1283A440CE9D35DF48551D

SHA1:

2EBCE3A9C9F3A514F7F35E180400E7AB4DC12EDC

SHA256:

47F42570C1328798A903A976412A5D004FA38CA514F7262CD2FD3F80F55D02DA

SSDEEP:

98304:oxZ5IVvggs2lCJL3KK6NC6/lmNVD0Z9Nu6HYWFV5kAwtL7ex00CQVXe5plC964U5:EbZIDf89VLE4iF85yfepv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6256)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • LARKSHARP SPOOFER.exe (PID: 6712)
    • Process drops legitimate windows executable

      • LARKSHARP SPOOFER.exe (PID: 6712)
    • Process drops python dynamic module

      • LARKSHARP SPOOFER.exe (PID: 6712)
    • Drops a system driver (possible attempt to evade defenses)

      • LARKSHARP SPOOFER.exe (PID: 6712)
    • Executable content was dropped or overwritten

      • LARKSHARP SPOOFER.exe (PID: 6712)
    • Application launched itself

      • LARKSHARP SPOOFER.exe (PID: 6712)
    • Loads Python modules

      • LARKSHARP SPOOFER.exe (PID: 6808)
    • Starts CMD.EXE for commands execution

      • LARKSHARP SPOOFER.exe (PID: 6808)
      • WinRAR.exe (PID: 6256)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6256)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 6256)
  • INFO

    • Manual execution by a user

      • LARKSHARP SPOOFER.exe (PID: 6712)
    • Checks supported languages

      • LARKSHARP SPOOFER.exe (PID: 6712)
      • LARKSHARP SPOOFER.exe (PID: 6808)
      • mode.com (PID: 6852)
      • MpCmdRun.exe (PID: 6972)
    • The sample compiled with english language support

      • LARKSHARP SPOOFER.exe (PID: 6712)
    • Reads the computer name

      • LARKSHARP SPOOFER.exe (PID: 6712)
      • MpCmdRun.exe (PID: 6972)
    • Reads the machine GUID from the registry

      • LARKSHARP SPOOFER.exe (PID: 6808)
    • Create files in a temporary directory

      • LARKSHARP SPOOFER.exe (PID: 6712)
      • MpCmdRun.exe (PID: 6972)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 6852)
    • PyInstaller has been detected (YARA)

      • LARKSHARP SPOOFER.exe (PID: 6712)
      • LARKSHARP SPOOFER.exe (PID: 6808)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6256)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6256)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2024:10:11 09:49:10
ZipCRC: 0x0a6cdeac
ZipCompressedSize: 10370472
ZipUncompressedSize: 10528569
ZipFileName: LARKSHARP SPOOFER.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
9
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe larksharp spoofer.exe conhost.exe no specs larksharp spoofer.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6256"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\LARKSHARPSPOOFER.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6712"C:\Users\admin\Desktop\LARKSHARP SPOOFER.exe" C:\Users\admin\Desktop\LARKSHARP SPOOFER.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\larksharp spoofer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6720\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeLARKSHARP SPOOFER.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6808"C:\Users\admin\Desktop\LARKSHARP SPOOFER.exe" C:\Users\admin\Desktop\LARKSHARP SPOOFER.exeLARKSHARP SPOOFER.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\larksharp spoofer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6836C:\WINDOWS\system32\cmd.exe /c mode con: cols=110 lines=30C:\Windows\System32\cmd.exeLARKSHARP SPOOFER.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
6852mode con: cols=110 lines=30C:\Windows\System32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DOS Device MODE Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6912C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR6256.34717\Rar$Scan16994.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
6920\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6972"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR6256.34717"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
Total events
1 669
Read events
1 660
Write events
9
Delete events
0

Modification events

(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\LARKSHARPSPOOFER.zip
(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6256) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan
Operation:writeName:DefScanner
Value:
Windows Defender
Executable files
21
Suspicious files
1
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\MSVCP140.dllexecutable
MD5:72F3D84384E888BF0D38852EB863026B
SHA256:A4C2229BDC2A2A630ACDC095B4D86008E5C3E3BC7773174354F3DA4F5BEB9CDE
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\libcrypto-1_1.dllexecutable
MD5:89511DF61678BEFA2F62F5025C8C8448
SHA256:296426E7CE11BC3D1CFA9F2AEB42F60C974DA4AF3B3EFBEB0BA40E92E5299FDF
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\mac.EXEexecutable
MD5:AED42FF110A595753BB2F83171727285
SHA256:A124932386DBCC5E6B5901F2460F68E7CFB1DFF1406CD899620E8880461C60FB
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\_bz2.pydexecutable
MD5:A49C5F406456B79254EB65D015B81088
SHA256:CE4EF8ED1E72C1D3A6082D500A17A009EB6E8ED15022BF3B68A22291858FECED
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\_socket.pydexecutable
MD5:4827652DE133C83FA1CAE839B361856C
SHA256:87832A3B89E2ADA8F704A8F066013660D591D9CE01CE901CC57A3B973F0858BA
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\_ctypes.pydexecutable
MD5:291A0A9B63BAE00A4222A6DF71A22023
SHA256:820E840759EED12E19F3C485FD819B065B49D9DC704AE3599A63077416D63324
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\amigendrv64.sysexecutable
MD5:9ACCEBD928A8926FECF317F53CD1C44E
SHA256:811E5D65DF60DFB8C6E1713DA708BE16D9A13EF8DFCD1022D8D1DDA52ED057B2
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\microsoft.vbstext
MD5:AF1905DC8BD39D2D407F12FB08272BEB
SHA256:BB113A896A43CB1B03A8B57A85E8D46FAF39FE4AE4AF97581B264415EF32BD3B
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\select.pydexecutable
MD5:E21CFF76DB11C1066FD96AF86332B640
SHA256:FCC2E09A2355A5546922874FB4CAC92EE00A33C0ED6ADBC440D128D1E9F4EC28
6712LARKSHARP SPOOFER.exeC:\Users\admin\AppData\Local\Temp\_MEI67122\VCRUNTIME140.dllexecutable
MD5:4A365FFDBDE27954E768358F4A4CE82E
SHA256:6A0850419432735A98E56857D5CFCE97E9D58A947A9863CA6AFADD1C7BCAB27C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
536
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1512
RUXIMICS.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
536
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1512
RUXIMICS.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
536
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1512
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
unknown
536
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1512
RUXIMICS.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
unknown
536
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 88.221.169.152
unknown
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
self.events.data.microsoft.com
  • 20.50.201.200
whitelisted

Threats

No threats detected
No debug info